Sciweavers

3003 search results - page 172 / 601
» Software Security: Building Security In
Sort
View
CCS
2007
ACM
15 years 10 months ago
Hardware-rooted trust for secure key management and transient trust
We propose minimalist new hardware additions to a microprocessor chip that protect cryptographic keys in portable computing devices which are used in the field but owned by a cen...
Jeffrey S. Dwoskin, Ruby B. Lee
DATE
2005
IEEE
154views Hardware» more  DATE 2005»
15 years 10 months ago
Secure Embedded Processing through Hardware-Assisted Run-Time Monitoring
— Security is emerging as an important concern in embedded system design. The security of embedded systems is often compromised due to vulnerabilities in “trusted” software t...
Divya Arora, Srivaths Ravi, Anand Raghunathan, Nir...
DBSEC
2004
170views Database» more  DBSEC 2004»
15 years 5 months ago
RBAC/MAC Security Analysis and Design for UML
In software construction, analysis investigates the boundary of a system (scope and requirements), its usage and access, and from a security perspective, who needs access to what ...
Thuong Doan, Steven A. Demurjian, Charles E. Phill...
SAFECOMP
2001
Springer
15 years 9 months ago
Project Experience with IEC 61508 and Its Consequences
The paper reports on the experiences with implementation of IEC 61508 in recent projects with European, North American and Japanese system vendors. The paper describes problems id...
Rainer Faller
ACSAC
1999
IEEE
15 years 8 months ago
How to Cheat at the Lottery (or, Massively Parallel Requirements Engineering)
Collaborative software projects such as Linux and Apache have shown that a large, complex system can be built and maintained by many developers working in a highly parallel, relat...
Ross J. Anderson